TAI Categories
At Lavasoft, we know that different types of spyware and malware present different types of threats. That is why, when you complete a scan with Ad-Aware, each threat is classified under one of the following categories. The comprehensive categories allow you to easily and quickly identify the types of threats that are on your computer. Click on the categories below to learn more.
- Adware
- Adware is a generally harmless application that displays unexpected or unwanted advertising on your computer. It usually enters your system through freeware bundles or as additional/required content with shareware. You may choose to remove adware in order to stop unwanted advertising, but some programs are required in order to use a host application. Adware that may have tracking features/capabilities are in a more descriptive category (like Trackware or Data Miner) in order to give you more detailed information.
- Annoyware
- Annoyware is a type of adware that is frequently intrusive and disruptive. It causes an excessive number of popups/popunders, even when you are not connected to the Internet. Annoyware can also cause noticeable system and/or bandwidth slowdowns.
- Data miner
- Data miners are designed to actively collect information about you. Data miners can transmit your information to a remote server owned by the application's producer (This may be disclosed to you through a privacy policy/licensing).
- Dialer
- Dialers are designed to change your DUN (Dial Up Networking) settings in order to connect to your phone line in stealth mode, and/or dial expensive connections without your authorization.
- Exploit
- Exploit threats employ the use of software or a system exploit to install/operate.
- Hijacker
- Hijackers are designed to hijack your home page, Hosts file, browser favorites, default search engine, and/or system settings.
- Keylogger
- Keyloggers are designed to record and/or transmit keystroke information.
- Malware
- Malware is malicious software that is designed to harm your system.
- Misc
- This category is for noteworthy threats that do not fall under a specific detection category.
- Monitoring Tool
- Monitoring tools include Remote Access Trojans (RATs), Root Kits, etc.
- MRU
- These harmless records of the Most Recently Used (MRU) lists (like recent documents) are stored in your registry, but are included as a category by customer request. Some anti-spyware applications list MRU as being potentially harmful, so it appears their scan detected more content.
- Spyware
- Spyware is software designed to secretively collect information. It may install in stealth mode to gather information and transmit it to second and third parties without your knowledge and consent.
- Trackware
- Trackware is similar to Data Miners, but is passive in nature. It includes tracking cookies as well as applications that collect anonymous (not personally identifiable) information, like GUID’s or sites visited.
- Virus
- A virus is a self-replicating program that injects itself into other programs. It can harm your system by damaging files, folders, directory structures, and erasing your hard drive. The best protection for your computer is a 3-tiered approach: anti-spyware software, anti-virus software.
- Vulnerability
- These threats use system and/or security vulnerabilities to install and operate on your system.
- Worm
- A worm is a self-replicating virus and/or Trojan, designed to spread across many systems and networks. The best protection for your computer is a 3-tiered approach: anti-spyware software, anti-virus software